First, view and manage the currently logged in user
1. Use the W command to view the process information that the logged-on user is using,and the W command to display the names of the users who have logged in to the system and what they are
The following command environment is the centos6.6 system;
1234567891011121314151617181920212223
[[email protected] ~]# ifconfig eth0eth0 Link encap:Ethernet HWaddr 00:0C:29:2A:03:61 inet addr:192.168.20.50 Bcast:19
Linux system setup and basic Operation ? Use the Preferences settings and system management tools in the GNOME desktop suite to perform the following tasks A. set a static IP address for the first NIC and be able to communicate with other hosts in
How do I see whether the Linux system is 32-bit or 64-bit?Can be viewed with the command "getconf long_bit",If the returned result is 32, the description is 32 bits, and the result returned is 64, the description is 64 bits.Linux commandsCommand
I. SummaryThis article mainly introduces the concepts of Linux kernel modules and the simple module development process. Mainly from the module development of common directives, kernel module program structure, module usage count and module
Transferred from: http://www.cnblogs.com/peida/archive/2012/10/24/2736501.htmlLinux CD commands can be said to be the most basic Linux command statements, the other command statements to operate, are based on the use of the CD command. Therefore, to
LN is another very important command in Linux, and its function is to create a synchronized link for a file in another location. When we need to use the same file in different directories, we do not need to put a file that must be the same in every
The command to turn off a service such as a firewall in a previous release isService Iptables StopOr/etc/init.d/iptables stopTurn off boot:#chkconfig iptables offIn RHEL7, in fact, there is no such service[Email protected] ~]#
Chown the owner of the specified file to the specified user or group, the user can be either a user name or a user ID; a group can be a group name or a group ID; a file is a space-separated list of files to change permissions, and wildcard
Anything-sync-daemon (ASD) is a was a diminutive pseudo-daemon designed to manage target directories in TMPFS and to period ically sync them back to your physical disc (HDD/SSD). This was accomplished via a symlinking step and an innovative use of
Service OverviewUnder the Linux operating system, it is often necessary to create services that are made into shell scripts that need to be started automatically when the system is started and shut down automatically when it is shut down.You will
This article is an improvement of the shell script of the previous Watchdate Wdate, again first:650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/76/95/wKioL1ZWwy_juP9NAARfY7_6zMo324.jpg "title=" Wdate " alt= "Wkiol1zwwy_jup9naarfy7_6zmo324.
Linux time zone settings modification and time synchronizationOne, time zoneShow Time zoneDate--help Get helpDate-rDate +%zAll of the above two commands can be[Email protected] ~]# date-r; Date +%zFri, Oct 2012 23:34:27 +0800+0800The main is the
http://blog.csdn.net/mr_chenping/article/details/13767609When an unusual program exits, the kernel generates a core file (a memory image, plus debugging information) in the current working directory. Using GDB to view the core file, you can indicate
Several CPUsMore/proc/cpuinfo |grep "Physical ID" |uniq|wc-lEach CPU is a few cores (assuming the same CPU configuration)More/proc/cpuinfo |grep "Physical id" |grep "0" |wc-lCat/proc/cpuinfo | grep processor1. View the number of physical
Because a friend's Linux password forgot, let me help to fix,After the feeling, this method may still be used later,Summarize the record and make it easy to use later.The Linux version is: Ubuntu 14.04The first step is booting to grubThe second step
The CD command is one of the most commonly used commands in Linux, and I think the other should be LS (follow-up introduction). The main function is to jump to the CD command to specify the directory.CD command format: CD [-l|-p] [dir]Common CD
Linux configuration file Optimization1. limits. how conf works limits. the conf file is actually the configuration file pam_limits.so in Linux PAM (plug-in Authentication module, Pluggable Authentication Modules), which breaks through the default
HAproxy allows backend RS to record real IP addresses
# Let RS record the real IP address of the client
#1. Add the following parameters to haproxy. cfg.
Listen www...Option forwardfor# If the backend server needs to obtain the real ip address of
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service